Evaluating security threats in mainframe and client/server environments
Information and Management
Enemy at the gate: threats to information security
Communications of the ACM - Program compaction
Wireless hotspots: petri dish of wireless security
Communications of the ACM - Hacking and innovation
Security measures in wired and wireless networks
ISIICT'09 Proceedings of the Third international conference on Innovation and Information and Communication Technology
Hi-index | 0.00 |
The objectives are: (1) to determine the risk assessment of information security threats, based upon the perceived impact and the perceived probability of occurrence of these threats; (2) to determine the extent of risk mitigation, based upon the perceived level of preparedness for each of these information security threats; and (3) to determine the extent to which the of occurrence and the impact of information security threats relate to the level of preparedness.